2008
DOI: 10.1002/dac.988
|View full text |Cite
|
Sign up to set email alerts
|

MLCC: A new hash‐chained mechanism for multicast source authentication

Abstract: SUMMARYAsymmetric cryptography has been widely used to generate a digital signature for message authentication. However, such a strategy cannot be used for packet authentication. Neither the source nor the receiver will be capable of handling the computational cost of asymmetric cryptography. For unicast communication, the solution adopted is based on symmetric cryptography. Solutions based on symmetric cryptography do not scale for multicast communication. Several solutions have been reported to authenticate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…Also, since the broadcasted commands by the utility to the smart meters through broadcast communication are critical, the smart meters must be assured that the received commands are broadcasted from an authorized entity and have not been altered. Therefore, BA protocols are required to authenticate the broadcaster and the broadcasted messages …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, since the broadcasted commands by the utility to the smart meters through broadcast communication are critical, the smart meters must be assured that the received commands are broadcasted from an authorized entity and have not been altered. Therefore, BA protocols are required to authenticate the broadcaster and the broadcasted messages …”
Section: Introductionmentioning
confidence: 99%
“…Therefore, BA protocols are required to authenticate the broadcaster and the broadcasted messages. [8][9][10] The current approach in recently introduced protocols is storing the secret information in the nonvolatile memory (NVM) of each party. Since the smart meters are located in physically insecure environments, they are vulnerable against a variety of physical attacks such as physical tampering and side-channel analysis.…”
Section: Introductionmentioning
confidence: 99%
“…In this survey, they pointed out that the source authentication for multicast environments has to focus on the confidentiality of each packet. In recent years, various schemes of the source authentication schemes for multicast [5][6][7][8][9][10][11][12] have been proposed to reduce the computation costs. These schemes are based on the hash-chain method, such as simple hash chain [5], multi-hash chain [6][7][8], hash tree [9,10], and Timed Efficient Stream Loss-tolerant Authentication (TESLA) schemes [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…In 1981, Lamport [1] proposed the first authentication scheme. Since then, many authentication schemes [2][3][4][5][6][7][8][9][10][11] have been proposed to improve security or performance.…”
Section: Introductionmentioning
confidence: 99%
“…This also incurs management problem. All of the above authentication schemes [1][2][3][4][5][6][7][8][9][10][11] are not suitable for the multiserver environment because they are designed for the single server environment. To satisfy practical applications, mutual authentication with key agreement (MAKA) protocol for multiserver environment is studied widely.…”
Section: Introductionmentioning
confidence: 99%